This module contains basic filesystem types and interfaces. This includes:
The concept of different file types including basic files, mount points, tmp files, etc.
Access to groups of files and all files.
Types and interfaces for the basic filesystem layout (/, /etc, /tmp, /usr, etc.).
This module is required to be included in all policies.
Add entries in the /var/lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Append files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Associate to root file system.
Parameter: | Description: |
---|---|
file_type |
Type of the file to associate. |
Allow the specified type to associate to a filesystem with the type of the temporary directory (/tmp).
Parameter: | Description: |
---|---|
file_type |
Type of the file to associate. |
Mark the specified type as a file that is related to authentication.
Parameter: | Description: |
---|---|
file_type |
Type of the authentication-related file. |
Create a private type object in boot with an automatic type transition
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to be created. |
object_class |
The object class of the object being created. |
name |
The name of the object being created. |
Test write access on lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Check write access on /var/run directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a configuration file.
Make the specified type usable for configuration files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with configuration management tools.
Example usage with a domain that can read its configuration file /etc:
type myconffile_t; files_config_file(myconffile_t) allow mydomain_t myconffile_t:file read_file_perms; files_search_etc(mydomain_t)
Parameter: | Description: |
---|---|
file_type |
Type to be used as a configuration file. |
Create all files as is.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create all runtime named pipes
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create all runtime sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create all spool sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create directories in /boot
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create a boot flag.
Create a boot flag, such as /.autorelabel and /.autofsck.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
name |
The name of the object being created. |
Install a kernel into the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Install a system.map into the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create lock directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Create non-security directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create a /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all runtime dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all runtime files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all runtime named pipes
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all runtime sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all runtime symlinks.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all spool sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a boot flag.
Delete a boot flag, such as /.autorelabel and /.autofsck.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete system configuration files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete generic lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a kernel from /boot.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a system.map in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete character device nodes in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remove entries from the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete symbolic links in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete generic runtime symlinks.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remove entries from the tmp directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete generic directories in /usr in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete generic files in /usr in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to get the attributes of all directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all named pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all runtime data files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all named sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all tmp files.
Parameter: | Description: |
---|---|
domain |
Domain not to audit. |
Do not audit attempts to get the attributes of all tmp sock_file.
Parameter: | Description: |
---|---|
domain |
Domain not to audit. |
Do not audit attempts to get attributes of the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of the home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security block devices.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security character devices.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security named pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security named sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to ioctl all runtime files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit listing of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to list contents of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list the contents of /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to list all non-security directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit listing of the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain not to audit. |
Do not audit attempts to list the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Load kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to create, read, write, and delete generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files in /etc
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files in /etc that are dynamically created on boot, such as mtab.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to relabel configuration directories
Parameter: | Description: |
---|---|
domain |
Domain not to audit. |
Do not audit attempts to relabel configuration files
Parameter: | Description: |
---|---|
domain |
Domain not to audit. |
Do not audit attempts to read or write character device nodes in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to add and remove entries from /usr directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the contents of any directories on extended attribute filesystems.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit searching of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the locks directory (/var/lock).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search /mnt.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search generic spool directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the contents of /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes on all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes of the etc_runtime files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
dontaudit getattr on tmpfs files
Parameter: | Description: |
---|---|
domain |
Domain to not have stat on tmpfs files audited |
Do not audit attempts to write to mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to all runtime files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to /etc dirs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to write etc runtime files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to / dirs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit write of /usr dirs
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
dontaudit write of /usr files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to /var.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Create objects in /etc with a private type using a type_transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
Private file type. |
class |
Object classes to be created. |
name |
The name of the object being created. |
Create objects in /etc with type etc_t with specified name to overide default transition
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
class |
Object classes to be created. |
name |
The name of the object being created. |
Create, etc runtime objects with an automatic type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object |
The class of the object being created. |
name |
The name of the object being created. |
Execute generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute generic programs in /var/run in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute generic programs in /usr in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute programs in /usr/src in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow shared library text relocations in all files.
Allow shared library text relocations in all files.
This is added to support WINE policy.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get etc_t service status.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all filesystems with the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all named pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all named sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to get the attributes of all tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all tmpfs files.
Parameter: | Description: |
---|---|
type |
Domain allowed access. |
Get attributes of the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of a filesystem mounted on /boot.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Getattr of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the etc_runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of generic lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of a rootfs file system.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of files in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of files in /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create objects in /home.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
home_type |
The private type. |
object |
The class of the object being created. |
name |
The name of the object being created. |
Create objects in the kernel module directories with a private type via an automatic type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to be created. |
object_class |
The object class of the object being created. |
name |
The name of the object being created. |
List the contents of all directories on extended attribute filesystems.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List all tmp directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List contents of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get listing of home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the kernel module directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List generic lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-authentication related directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List all non-security directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the runtime process ID directories (/var/run).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of generic spool (/var/spool) directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of generic directories in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List world-readable directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Load kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable for lock files.
Parameter: | Description: |
---|---|
type |
Type to be used for lock files. |
Create an object in the locks directory, with a private type using a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Manage all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
manage all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete all runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write and delete all var_run (pid) files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write and delete all var_run (pid) symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in /boot.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage all configuration directories on filesystem
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage all configuration files on filesystem
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage generic directories in /etc
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Create, read, write, and delete generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in /etc that are dynamically created on boot, such as mtab.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete generic lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete generic spool files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete generic spool directories (/var/spool).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage temporary directories in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage temporary files and directories in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete objects in lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow domain to manage mount tables necessary for rpcd, nfsd, etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to manage non-security directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete the pseudorandom number generator seed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in the /usr directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
manage var_lib_t dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Map generic files in /etc.
Allow the specified domain to map generic files in /etc.
Related interfaces:
files_read_etc_files()
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mmap non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Map generic files in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
map generic files in /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and mmap kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount all filesystems with the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount filesystems on all polyinstantiation member directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on a directory with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on the etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on the etc_runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a system.map in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on all non-security directories and files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount on the root directory (/)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
mounton a /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount filesystems in the tmp directory (/tmp)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable for filesystem mount points.
Parameter: | Description: |
---|---|
type |
Type to be used for mount points. |
Make the specified type a polyinstantiated directory.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a polyinstantiated directory. |
Make the specified type a polyinstantiation member directory.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a member directory. |
Make the domain use the specified type of polyinstantiated directory.
Parameter: | Description: |
---|---|
domain |
Domain using the polyinstantiated directory. |
file_type |
Type of the file to be used as a member directory. |
Make the specified type a parent of a polyinstantiated directory.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a parent directory. |
Allow access to manage all polyinstantiated directories on the system.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete the contents of /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all block nodes with file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all character nodes with file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all directories on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read all files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all runtime files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all symbolic links on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read all tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
read files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read config files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read named pipes with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read sockets with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic files in /etc.
Allow the specified domain to read generic files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:
/etc/fstab
/etc/passwd
/etc/services
/etc/shells
This interface does not include access to /etc/shadow.
Generally, it is safe for many domains to have this access. However, since this interface provides access to the /etc/passwd file, caution must be exercised, as user account names can be leaked through this access.
Related interfaces:
auth_read_shadow()
files_read_etc_runtime_files()
seutil_read_config()
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in /etc that are dynamically created on boot, such as mtab.
Allow the specified domain to read dynamically created configuration files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:
/etc/motd
/etc/mtab
/etc/nologin
This interface does not include access to /etc/shadow.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic spool files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read kernel files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read system.map in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
read files in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-authentication related symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic runtime files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic files in /usr.
Allow the specified domain to read generic files in /usr. These files are various program files that do not have more specific SELinux types. Some examples of these files are:
/usr/include/*
/usr/share/doc/*
/usr/share/info/*
Generally, it is safe for many domains to have this access.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic files in /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic symbolic links in /var/lib
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable named pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a filesystem to and from the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Relabel to and from all lock directory types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from/to all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all runtime directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all runtime files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all runtime named sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all runtime symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all temporary directory types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all temporary file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel configuration directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel configuration files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from and to generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel temporary directories in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from and to kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from/to non-security directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from/to all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from rootfs file system.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
relabelto/from var directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
relabel var_lib_t dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from user home root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a file from the type used in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a filesystem to the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel directories to etc_t.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to etc_runtime_t dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to etc_runtime_t files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to user home root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a file to the type used in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remount a filesystem mounted on /boot.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remount etc filesystems.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create an object in the root directory, with a private type using a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Make the specified type usable for runtime process ID files.
Make the specified type usable for runtime process ID files, typically found in /var/run. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a PID file type may result in problems with starting or stopping services.
Related interfaces:
files_runtime_filetrans()
Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:
type mypidfile_t; files_runtime_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_runtime_filetrans(mydomain_t, mypidfile_t, file)
Parameter: | Description: |
---|---|
type |
Type to be used for PID files. |
Create an object in the /run directory, with a private type.
Create an object in the process ID directory (e.g., /var/run) with a private type. Typically this is used for creating private PID files in /var/run with the private type instead of the general PID file type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.
Related interfaces:
files_runtime_file()
Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:
type mypidfile_t; files_runtime_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_runtime_filetrans(mydomain_t, mypidfile_t, file)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Create a generic lock directory within the run directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
name |
The name of the object being created. |
rw all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read and write symbolic links in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Add and remove entries from /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write files in /etc that are dynamically created on boot, such as mtab.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write generic named sockets in the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Add and remove entries in the /var/lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
rw non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write generic runtime files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Add and remove entries from /usr directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read-write /var/lib directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of all directories on extended attribute filesystems.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of the kernel module directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the locks directory (/var/lock).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of runtime process ID directories (/var/run).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of generic spool directories (/var/spool).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search directories in /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the content of /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the /var/lib directory.
Search the /var/lib directory. This is necessary to access files or directories under /var/lib that have a private type. For example, a domain accessing a private library file in the /var/lib directory:
allow mydomain_t mylibfile_t:file read_file_perms; files_search_var_lib(mydomain_t)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a file that should not be dontaudited from browsing from user domains.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a member directory. |
Make the specified type usable for security file filesystem mount points.
Parameter: | Description: |
---|---|
type |
Type to be used for mount points. |
Set the attributes of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of all tmp directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the generic lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /usr directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create objects in the spool directory with a private type with a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
Type to which the created node will be transitioned. |
class |
Object class(es) (single or set including {}) for which this the transition will occur. |
name |
The name of the object being created. |
start etc_t service
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
stop etc_t service
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a file used for temporary files.
Make the specified type usable for temporary files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with purging temporary files.
Related interfaces:
files_tmp_filetrans()
Example usage with a domain that can create and write its temporary file in the system temporary file directories (/tmp or /var/tmp):
type mytmpfile_t; files_tmp_file(mytmpfile_t) allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms }; files_tmp_filetrans(mydomain_t, mytmpfile_t, file)
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a temporary file. |
Create an object in the tmp directories, with a private type using a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Transform the type into a file, for use on a virtual memory filesystem (tmpfs).
Parameter: | Description: |
---|---|
type |
The type to be transformed. |
Make the specified type usable for files in a filesystem.
Make the specified type usable for files in a filesystem. Types used for files that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running. If the type is used for device nodes (character or block files), then the dev_node() interface is more appropriate.
Related interfaces:
application_domain()
application_executable_file()
corecmd_executable_file()
init_daemon_domain()
init_domaion()
init_ranged_daemon_domain()
init_ranged_domain()
init_ranged_system_domain()
init_script_file()
init_script_domain()
init_system_domain()
files_config_files()
files_lock_file()
files_mountpoint()
files_runtime_file()
files_security_file()
files_security_mountpoint()
files_tmp_file()
files_tmpfs_file()
logging_log_file()
userdom_user_home_content()
Example:
type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;
Parameter: | Description: |
---|---|
type |
Type to be used for files. |
Unconfined access to files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Unmount all filesystems with the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Unmount a rootfs filesystem.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create objects in the /usr directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
The type of the object to be created |
object_class |
The object class. |
name |
The name of the object being created. |
Create objects in the /var directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
The type of the object to be created |
object_class |
The object class. |
name |
The name of the object being created. |
Create objects in the /var/lib directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
The type of the object to be created |
object_class |
The object class. |
name |
The name of the object being created. |
watch all directories of file_type
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch all mountpoints.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch all mountpoints.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch /etc directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch /etc files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch /etc symlinks
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch the user home root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch /var/run directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Watch generic directories in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Check if all mountpoints are writable.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to modify any directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write named generic runtime pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to write to /var.dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |